All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH] uio: potential double frees if __uio_register_device() fails
@ 2018-08-02  8:24 ` Dan Carpenter
  0 siblings, 0 replies; 2+ messages in thread
From: Dan Carpenter @ 2018-08-02  8:24 UTC (permalink / raw)
  To: Greg Kroah-Hartman, Hans J. Koch; +Cc: linux-kernel, kernel-janitors

The uio_unregister_device() function assumes that if "info->uio_dev" is
non-NULL that means "info" is fully allocated.  Setting info->uio_de
has to be the last thing in the function.

In the current code, if request_threaded_irq() fails then we return with
info->uio_dev set to non-NULL but info is not fully allocated and it can
lead to double frees.

Fixes: beafc54c4e2f ("UIO: Add the User IO core code")
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>

diff --git a/drivers/uio/uio.c b/drivers/uio/uio.c
index 144cf7365288..cf388c384553 100644
--- a/drivers/uio/uio.c
+++ b/drivers/uio/uio.c
@@ -957,8 +957,6 @@ int __uio_register_device(struct module *owner,
 	if (ret)
 		goto err_uio_dev_add_attributes;
 
-	info->uio_dev = idev;
-
 	if (info->irq && (info->irq != UIO_IRQ_CUSTOM)) {
 		/*
 		 * Note that we deliberately don't use devm_request_irq
@@ -975,6 +973,7 @@ int __uio_register_device(struct module *owner,
 			goto err_request_irq;
 	}
 
+	info->uio_dev = idev;
 	return 0;
 
 err_request_irq:

^ permalink raw reply related	[flat|nested] 2+ messages in thread

* [PATCH] uio: potential double frees if __uio_register_device() fails
@ 2018-08-02  8:24 ` Dan Carpenter
  0 siblings, 0 replies; 2+ messages in thread
From: Dan Carpenter @ 2018-08-02  8:24 UTC (permalink / raw)
  To: Greg Kroah-Hartman, Hans J. Koch; +Cc: linux-kernel, kernel-janitors

The uio_unregister_device() function assumes that if "info->uio_dev" is
non-NULL that means "info" is fully allocated.  Setting info->uio_de
has to be the last thing in the function.

In the current code, if request_threaded_irq() fails then we return with
info->uio_dev set to non-NULL but info is not fully allocated and it can
lead to double frees.

Fixes: beafc54c4e2f ("UIO: Add the User IO core code")
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>

diff --git a/drivers/uio/uio.c b/drivers/uio/uio.c
index 144cf7365288..cf388c384553 100644
--- a/drivers/uio/uio.c
+++ b/drivers/uio/uio.c
@@ -957,8 +957,6 @@ int __uio_register_device(struct module *owner,
 	if (ret)
 		goto err_uio_dev_add_attributes;
 
-	info->uio_dev = idev;
-
 	if (info->irq && (info->irq != UIO_IRQ_CUSTOM)) {
 		/*
 		 * Note that we deliberately don't use devm_request_irq
@@ -975,6 +973,7 @@ int __uio_register_device(struct module *owner,
 			goto err_request_irq;
 	}
 
+	info->uio_dev = idev;
 	return 0;
 
 err_request_irq:

^ permalink raw reply related	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2018-08-02  8:25 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-08-02  8:24 [PATCH] uio: potential double frees if __uio_register_device() fails Dan Carpenter
2018-08-02  8:24 ` Dan Carpenter

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.